Consideration of physical security, control of local and remote access, security in the design, testing, and implementation of computer systems. Risk analysis, impact of administrative controls, controls in networks and open systems. Recognition and measurement of potential loss. Security audits and information systems (electronic data processing) auditing. Contingency planning. |